Publications

Journal Articles

YearAuthorsTitleJournalURL Link
2018Darine Ameyed, Moeiz Miraoui, Atef Zaguia, Fehmi Jaafar, and Chakib TadjUsing Probabilistic Temporal Logic PCTL and Model Checking for Context PredictionComputing and Informatics Journal
2017Fehmi Jaafar, Angela Lozano, Kim Mens, and Yann-Gaël Guéhéneuc.Analyzing Software Evolution and Quality by Extracting Asynchrony Change-patterns.Journal of Systems and Software Volume 131Link
2017Mohammad Shahrear Iqbal, Fehmi Jaafar, Mohammad Zulkernine, and Yuan Gu.Protecting internet users from becoming victimized attackers of click-fraud.Journal of Software : Evolution and Process.Link
2016Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, Foutse Khomh, and Mohammad ZulkernineEvaluating the Impact of Design Pattern and Anti-pattern Dependencies on Faults and Changes.Journal of Empirical Software Engineering.Link
2014Angela Lozano, Fehmi Jaafar, Kim Mens, and Yann-Gaël Guéhéneuc.Clones and Macro Co-ChangesJournal of Electronic Communications of the European Association of Software Science and Technology.Link
2014Fehmi Jaafar, Yann-Gaël Guéhéneuc, Giuliano Antoniol, and Sylvie Hamel.Detecting Asynchrony and Dephase Change Patterns by Mining Software Repositories.Journal of Software : Evolution and Process.Link
2013Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, Foutse KhomhAnalysing Anti-patterns Static Relationships with Design PatternsElectronic Communication of the European Association of Software Science and Technology, Volume 59Link

Conference Publications

YearAuthorsTitleConference InformationURL Link
2019Samip Dhakal, Fehmi Jaafar, and Pavol ZavarskyPrivate Blockchain Network for IoT Device Firmware Integrity Verification and UpdateASE 2019: The IEEE International Symposium on High Assurance Systems Engineering, Hangzhou, China
2019Tunde Akeem Yekini, Pavol Zavarsky, and Fehmi JafaarStudy of Trust at Device Level of the Internet of Things ArchitectureASE 2019: The IEEE International Symposium on High Assurance Systems Engineering, Hangzhou, China
2019Ranbir Singh Bali, Fehmi Jaafar and Pavol ZavaraskyLightweight Authentication for MQTT by using Topic-Based Self Key Agreement and Block CipherThe International Conference on Cryptography, Security and Privacy (ICCSP 2019), Kuala Lumpur, Malaysia
2018Gagandeep Singh, Fehmi Jaafar, Pavol ZavarskyAn Analysis of Android Malware Behavior.International Workshop on Information Assurance, Lisbon, PortugalLink
2018Caesar Jude Clemente, Fehmi Jaafar, and Yasir Malik. Is Predicting Software Security Bugs using Deep Learning Better than the Traditional Machine Learning Algorithms?IEEE International Conference on Software Quality, Reliability, and Security, Lisbon, PortugalLink
2018Pooja Rajendra Prasad, Sergey Butakov, and Fehmi Jaafar.Information Security Considerations for Wireless Infusion Pumps.IEEE International Workshop on Safety and Security in Cyber-Physical Systems, Lisbon, Portugal.Link
2018Gurjot Balraj Singh, Fehmi Jaafar, and Sergey ButakovAnalysis of Overhead Caused by Security Mechanisms in IaaS CloudIEEE International Conference on Control, Decision and Information Technologies, CoDIT, Thessaloniki, GreeceLink
2018Jasmeen Kaur, Fehmi Jaafar, and Pavol Zavarsky.Experimental Analysis of Behavior of Crypto RansomwareThe Thirteenth International Conference on Systems, ICONS, Athens, GreeceLink
2018Mayank Jaiswal, Yasir Malik, and Fehmi JaafarAndroid Gaming Malware Detection Using System Call Behaviour AnalysisThe IEEE International Symposium on Digital Forensic and Security, ISDFS, Antalya, Turkey.Link
2018Manjinder Singh, Sergey Butakov and Fehmi JaafarAnalyzing Overhead from Security and Administrative Functions in Virtual EnvironmentThe IEEE 2018 International Conference on Platform Technology and Service, PlatCon, South Koreahttps://ieeexplore.ieee.org/document/8472755
2018Gurpreet Kaur, Fehmi Jaafar and Yasir MalikDetecting Blind Cross-Site Attacks Using Machine LearningThe 2018 ACM International Conference on Signal Processing and Machine Learning, Shanghai, China
2017Maryam Davari, Mohammad Zulkernine, Fehmi JaafarAn Automatic Software Vulnerability Classification Framework2017 International Conference on Software Security and Assurance (ICSSA), Altoona, PA, USALink
2017Fehmi JaafarAn Integrated Architecture for IoT Fingerprinting.IEEE QRS Companion 2016. IEEE International Conference on Software Quality, Reliability and Security, Prague, Czech Republic.Link
2017Harjot Kaur, Pavol Zavarsky, and Fehmi JaafarUnauthorized Data Leakage from an Organisation through Web Browser Fingerprinting Vulnerability.The IEEE World Congress on Internet Security, London, United KingdomLink
2017Fehmi Jaafar, Angela Lozano, Yann-Gaël Guéhéneuc, and Kim Mens.On the Analysis of Co-Occurrence of Anti-Patterns and Clones.IEEE International Conference on Software Quality, Reliability and Security, Prague, Czech RepublicLink
2016Fehmi Jaafar, Gabriela Nicolescu, and Christian Richard.A Systematic Approach For Privilege Escalation Prevention.IEEE International Conference on Software Quality, Reliability and Security, Companion, Vienna, Austria.Link
2016Md Shahrear Iqbal, Fehmi Jaafar, Mohammad Zulkernine, and Yuan Gu.Fighting Click-Fraud from User Side.IEEE High Assurance Systems Engineering Symposium., Orlando, United StatesLink
2015Darine Ameyed, Fehmi Jaafar, and Jaouhar Fattahi.A Slow Read attack Using Cloud.The International Conference on Electronics, Computers and Artificial Intelligence, Bucharest, Romania.Link
2014Fehmi Jaafar,Foutse Khomh,Yann-Gaël GuéhéneucAnti-pattern Mutations and Fault-proneness.The 14th International Conference on Quality Software., Dallas, United StatesLink
2013Fehmi Jaafar, Salima Hassaine, Yann-Gaël Guéhéneuc, Sylvie Hamel, and Bram Adams.On the Relationship Between Program Evolution and Fault-proneness.European Conference on Software Maintenance and Reengineering., Genova, ItalyLink
2013Nasir Ali, Fehmi Jaafar, and Ahmed E. Hassan.Leveraging Historical Co-Change Information for Requirements Traceability.The Working Conference on Reverse Engineering., Koblenz-Landau, GermanyLink
2013Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, and Foutse Khomh.Mining the Relationship Between Anti-patterns Dependencies and Fault-proneness.Working Conference on Reverse Engineering, Koblenz-Landau, GermanyLink
2012Fehmi JaafarOn the analysis of evolution of software artefacts and programs.The IEEE International Conference on Software Engineering.Link
2011Fehmi Jaafar, Yann-Gaël Guéhéneuc, Giuliano Antoniol, and Sylvie Hamel.An Exploratory Study of Macro Co-Changes.The Working Conference on Reverse Engineering, IrelandLink
Close Menu
en_USEnglish
fr_CAFrench en_USEnglish